Research
Security News
Malicious npm Package Targets Solana Developers and Hijacks Funds
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
ISCC - JSON-LD Metadata and OpenAPI Service Descriptions
This repository hosts all schema definitions of the ISCC. Schemas are defined in OpenAPI v3.1.0 format and serve as a single source of truth for auto-generated JSON Schema definitions, JSON-LD contexts, and other schema related artifacts.
Metadata is data about data. For digital content, metadata may describe assets for different purposes such as data management, data provenance, allocation of royalties, indexing, disambiguation, process automation, etc.
Calculating ISCC codes requires extensive processing of media assets. As a by-product, an ISCC processor can automatically produce and retain metadata that describes the asset and helps with comparing and matching digital content. ISCC creation is also an opportunity to embed metadata into a digital asset. Once the metadata is embedded, an ISCC processor will automatically regenerate the same ISCC Meta-Code without manually supplying custom metadata for processing. As the ISCC targets a broad set of use-cases, it comes with a minimal and generic metadata schema. This site documents the ISCC metadata model.
For the identification of digital assets, ISCC distinguishes between two major types of metadata:
Implicit metadata is data that can be measured by analyzing a media asset. For example, an ISCC processor can infer pixel width and height from an image or duration from an audio file. The use of implicit metadata is very efficient and robust. It does not require a human to verify the correctness of the data because it can be measured and verified automatically.
Explicit metadata is data about media assets assembled and curated by people. It is often stored separately from the files in databases but may also be embedded into media assets. In contrast to implicit metadata, human-curated metadata is prone to errors, laborious to manage, and often not up to date. Platforms also tend to remove embedded metadata from the files they are hosting.
Documentation is hosted at schema.iscc.codes
Under development. Expect breaking changes until we reach a version 1.0 release.
The source of code generation are the files at iscc_schema/models/*
.
The outputs produced when running poe build
are:
docs/schema/iscc.json
- JSON Schema for ISCC Metadatadocs/schema/index.md
- JSON Schema Markdown documentationdocs/context/iscc.jsonld
- JSON-LD context for ISCC Metadatadocs/terms/index.md
- ISCC Metadata Vocabulary documentationiscc_schema/schema.py
- Pydantic models for ISCC Metadataiscc_schema/generator.py
- Pydantic models for Generator Service APIThe generated files are published under the following canonical URLs:
http://purl.org/iscc/schema
- JSON Schema latest versionhttp://purl.org/iscc/context
- JSON-LD Context latest versionhttp://purl.org/iscc/terms
- ISCC Metadata Vocabulary latest versionhttp://pypi.org/project/iscc-schema
- Python package with pydantic modelsThe OpenAPI Specification allows for
extending the
specification with custom fields. Extensions must start with x-
.
All ISCC extensions start with x-iscc-
:
x-iscc-context
- for documenting JSON-LD contexts.x-iscc-schema-doc
- for original descriptions from schema.org.x-iscc-embed
- for information on how to embed fields into media assets.x-iscc-status
- for information about status of the fieldFAQs
ISCC - JSON-LD Metadata and OpenAPI Service Descriptions
We found that iscc-schema demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.
Security News
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.